Toward worm detection in online social networks

W Xu, F Zhang, S Zhu - Proceedings of the 26th annual computer …, 2010 - dl.acm.org
Worms propagating in online social networking (OSN) websites have become a major
security threat to both the websites and their users in recent years. Since these worms …

A scalable, efficient and informative approach for anomaly‐based intrusion detection systems: theory and practice

O Salem, S Vaton, A Gravey - International Journal of Network …, 2010 - Wiley Online Library
In this paper, we present the design and implementation of a new approach for anomaly
detection and classification over high speed networks. The proposed approach is based first …

Worm traffic analysis and characterization

A Dainotti, A Pescapé, G Ventre - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
Internet worms are gaining ever more attention by the research community, representing
one of the hot research topics in the field of network security. Our knowledge of phenomena …

Monitoring networked applications with incremental quantile estimation

JM Chambers, DA James, D Lambert, S Vander Wiel - 2006 - projecteuclid.org
Networked applications have software components that reside on different computers.
Email, for example, has database, processing, and user interface components that can be …

Distinct counting with a self-learning bitmap

A Chen, J Cao, L Shepp, T Nguyen - Journal of the American …, 2011 - Taylor & Francis
Counting the number of distinct elements (cardinality) in a dataset is a fundamental problem
in database management. In recent years, there has been significant interest to address the …

Catching Instant Messaging Worms with Change-Point Detection Techniques.

G Yan, Z Xiao, SJ Eidenbenz - LEET, 2008 - usenix.org
Instant messaging (IM) systems have gained a lot of popularity in recent years. The
increasing number of IM users has lured malware authors to develop more worms and …

Characterizing the spread of correlated failures in large wireless networks

Y Xu, W Wang - 2010 Proceedings IEEE INFOCOM, 2010 - ieeexplore.ieee.org
Correlated failures pose a great challenge for the normal functioning of large wireless
networks, because an initial local failure may trigger a global sequence of related failures …

Darknet-based inference of internet worm temporal characteristics

Q Wang, Z Chen, C Chen - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
Internet worm attacks pose a significant threat to network security and management. In this
work, we coin the term Internet worm tomography as inferring the characteristics of Internet …

Inferring internet worm temporal characteristics

Q Wang, Z Chen, K Makki, N Pissinou… - … 2008-2008 IEEE …, 2008 - ieeexplore.ieee.org
Internet worm attacks pose a significant threat to network security. In this work, we coin the
term Internet worm tomography as inferring the characteristics of Internet worms from the …

Characterising anomalous events using change-Point correlation on unsolicited network traffic

E Ahmed, A Clark, G Mohay - Nordic Conference on Secure IT Systems, 2009 - Springer
Monitoring unused (or on dark d efault) IP addresses offers opportunities to extract useful
information about both on-going and new attack patterns. In recent years, different …